Apparatuses and methods to facilitate customer to supplier funds transfer via premium messages. In one aspect, an apparatus to electronically transfer funds from a customer to a supplier includes: a server component connected to a network; and a database coupled to the server component. The server component is configured to: transmit a plurality of premium rate mobile terminating text messages to the mobile cellular telephone of the customer; populate the database with an identification of the telephone number of the customer; receive classifications of offers sold by a plurality of suppliers; populate the database with a table associating the suppliers with classifications of the offers sold by the suppliers, the database including an identification of classifications for the telephone number of the customer; and determine whether to allow or prohibit transmission of text messages to effect payment based upon the identification of the classifications for the telephone number of the customer.

Claim:

What is claimed is:

1. An apparatus to electronically transfer funds from a customer to a supplier, the customer having a mobile cellular telephone with a telephone number, a mobile cellularoperator providing mobile cellular services to the mobile cellular telephone, a customer browser component connected to a network, the apparatus comprising: a server component connected to the network; and a database coupled to the server component,wherein the server component is configured to: populate the database with an identification of a telephone number of a customer and an identification of classifications permitted for the telephone number of the customer; receive classifications ofoffers sold by a plurality of suppliers; populate the database with a table associating the suppliers with classifications of the offers sold by the suppliers; receiving parental blocking commands including a telephone number, an associatedclassification for the telephone number and a password; storing the classification in the blocking command against a telephone number in the database matching the telephone number in the blocking command if the password is authenticated; after thecustomer has placed an order with the supplier, determine whether to allow or prohibit transmission of text messages to effect a payment for the order based upon the classification for the telephone number of the customer and a classification associatedwith the supplier; in response to a determination that the transmission of text messages to effect the payment for the order is allowed, transmit a message to the mobile cellular telephone to request a confirmation; and in response to the confirmation,transmit a plurality of premium rate mobile terminating text messages to the mobile cellular telephone of the customer to effect the payment for the order.

2. The apparatus of claim 1, wherein the server determines whether to allow or prohibit the transmission of the text messages based on the classifications for the telephone number of the customer, wherein the classifications are based on age.

3. The apparatus of claim 1, wherein each of the suppliers identifies appropriate classifications for each product sold through the transmitting premium rate mobile terminating text messages.

4. The apparatus of claim 1, wherein the server is configured to transmit the premium rate terminating text messages in accordance with a schedule over a number of clays to avoid exceeding a pre-established maximum daily limit.

5. The apparatus of claim 1, wherein the server component is configured to prompt customers to supply additional personal data and populate the database with the additional personal data.

6. A method to transfer funds electronically, the method comprising: populating a database at a server computer with an indication of a telephone number of a customer; receiving a classification of an offer sold by a supplier; populating thedatabase to associate the supplier with the classification; receiving parental blocking commands including a telephone number, an associated classification for the telephone number and a password; storing the classification in the blocking commandagainst a telephone number in the database matching the telephone number in the blocking command if the password is authenticated; and determining whether to allow transmitting of premium rate mobile terminating text messages to effect payment from thecustomer to the supplier dependent upon the classification permitted for the telephone number of the customer and the classification associated with the supplier.

9. The method of claim 6, wherein the transmitting of the premium rate terminating text messages is scheduled to occur over a number of days to avoid exceeding a pre-established maximum daily limit.

10. The method of claim 6, further comprising transmitting an additional text message to the mobile cellular telephone requesting additional data from the customer and receiving the additional data from the mobile cellular telephone.

11. The method of claim 6, further comprising prompting the customer to supply additional personal data and populating a database with the additional personal data.

12. The method of claim 6, further comprising facilitating access to transaction records for the customer after receiving details related to the telephone number of the customer.

13. A computer-readable medium having computer-readable instructions, the instructions causing a computer to perform a method, the method comprising: populating a database at the computer with an indication of a telephone number of a customer; receiving a classification of an offer sold by a supplier; populating the database to associate the supplier with the classification; receiving parental blocking commands including a telephone number, an associated classification for the telephonenumber and a password; storing the classification in the blocking command against a telephone number in the database matching the telephone number in the blocking command if the password is authenticated; and determining whether to allow transmittingof premium rate mobile terminating text messages to effect payment from the customer to the supplier dependent upon the classification permitted for the telephone number of the customer and the classification associated with the supplier.

14. The computer-readable medium of claim 13, wherein the method further comprises receiving and recording an unblocking code from a parent.

15. The computer-readable medium of claim 13, wherein the method further comprises transmitting an additional text message to the mobile cellular telephone requesting additional data from the customer and receiving the additional data from themobile cellular telephone.

16. The computer-readable medium of claim 13, wherein the method further comprises prompting the customer to supply additional personal data and populating the database with the additional personal data.

17. The computer-readable medium of claim 13, wherein the method further comprises facilitating access to transaction records for the customer via the telephone number of the customer.

Description:

RELATED APPLICATIONS

The present application claims priority to United Kingdom Patent Application Number 08 09 382.5, filed on May 23, 2008 and entitled "Funds Transfer Electronically," the disclosure of which is incorporated herein by reference.

FIELD OF THE TECHNOLOGY

At least some embodiments of the disclosure relate to apparatuses to transfer funds electronically from a customer to a supplier.

BACKGROUND

Systems for ordering products and/or services over the Internet and then making payment via the Internet are known. Many of these conventional systems involve identifying credit or debit card numbers such that funds may be obtained from a bankin a manner substantially similar to conventional credit card transactions.

A system for instructing payment to be made via mobile telephone text messages is described in United States patent application publication No. 2007/0203836 A1, published Aug. 30, 2007. This provides an alternative method of payment that maybe considered more secure than entering credit card details into a networked computer system, but it has a disadvantage in that it requires a set up procedure in order for the method to be deployed.

An alternative approach is described in United States patent application publication number 2009/0006217 A1, published Jan. 1, 2009, which was filed Jun. 29, 2007 and assigned U.S. patent application Ser. No. 11/824,607. This process hasbeen successfully deployed and is trading under the service mark "MOBILLCASH." The MOBILLCASH system allows an order to be placed over the Internet and for funds to be transferred by transmitting a plurality of premium rate mobile terminating textmessages to a mobile telephone held by the customer. Thus, by this method, a customer is only required to enter their telephone number, resulting in a charge being made to their mobile telephone account, from which it is then possible for funds to betransferred to the supplier.

A problem with the use of mobile telephones to effect payment is that such an approach may encourage abuses, where particular transactions may be considered undesirable.

SUMMARY OF THE DESCRIPTION

Apparatuses and methods to facilitate customer to supplier funds transfer via premium messages are described herein. Some embodiments are summarized in this section.

In one aspect, there is provided apparatus for the electronic transfer of funds from a customer to a supplier, including: a plurality of customer browser components connected to a network; a plurality of supplier browser components connected tothe network; a server component connected to the network and having a database component; a respective mobile cellular telephone with a telephone number operable by each of the plurality of customers; and at least one mobile cellular operator configuredto provide mobile cellular services to the mobile cellular telephones, where: the server component is configured to transmit a plurality of premium rate mobile terminating text messages to the mobile cellular telephone; the server component is configuredto populate the database with an identification of each customer's telephone number; the server component is configured to receive a classification of the nature of products/services sold by each supplier; the server component is configured to populatethe database component with a table associating suppliers with their respective classifications; the database includes an identification of classifications for each telephone number; and the server allows or prohibits the transmission of the textmessages to effect payment in dependence upon the identification of stored classifications for the requesting telephone number.

The disclosure includes methods and apparatuses which perform these methods, including data processing systems which perform these methods, and computer readable media containing instructions which when executed on data processing systems causethe systems to perform these methods.

Other features will be apparent from the accompanying drawings and from the detailed description which follows.

BRIEF DESCRIPTION OF THE DRAWINGS

The embodiments are illustrated by way of example and not limitation in the figures of the accompanying drawings in which like references indicate similar elements.

FIG. 1 shows a representation of the Internet.

FIG. 2 shows components forming a preferred embodiment working within the environment of FIG. 1 conducted within the environment of FIG. 2.

FIG. 9 details procedures for the allocation of messages identified in FIG. 7.

FIG. 10 shows an example of a constraints file of the type identified in FIG. 9.

FIG. 11 shows various use types.

FIG. 12 shows an environment substantially similar to that of FIG. 2, implementing one embodiment.

FIG. 13 shows an example of an invitation of the type identified in FIG. 12.

FIG. 14 shows a graphical user interface for receiving information.

FIG. 15 shows a database table for recording information.

FIG. 16 shows the generation of a report.

FIG. 17 details a table in database 208.

FIG. 18 shows an example of procedures for the transfer of information.

FIG. 19 illustrates the transfer of information to a user's browser.

FIG. 20 shows the display of information at a user's mobile cellular telephone.

FIG. 21 shows procedures performed in accordance with a preferred embodiment.

FIG. 22 shows a table of classifications.

FIG. 23 shows a graphical user interface for receiving information from a seller.

FIG. 24 illustrates a table within database 208.

FIG. 25 shows procedures for recording parental blocks.

FIG. 26 shows another table within the database.

FIG. 27 illustrates a preferred method.

FIG. 28 illustrates a message displayed to a user when a transaction is blocked.

DETAILED DESCRIPTION

The following description and drawings are illustrative and are not to be construed as limiting. Numerous specific details are described to provide a thorough understanding. However, in certain instances, well known or conventional details arenot described in order to avoid obscuring the description. References to one or an embodiment in the present disclosure are not necessarily references to the same embodiment; and, such references mean at least one.

A representation of the Internet 101 is illustrated in FIG. 1 in which potential customers are provided with customer browsers 101 to 108 and a plurality of suppliers are provided with supplier browsers 111 to 115. The environment thereforeallows customers to place orders with suppliers for the delivery of products and/or services and for the customers to transfer funds to the suppliers in order to effect payment for the goods and/or services.

It is known practice for a transaction to be initiated by a customer, such as customer 102, by the customer making a request for a web page to be served, which provides details of a supplier's products, allows product selections to be made andfacilitates payment for these products.

FIG. 2 shows components forming a preferred embodiment working within the environment of FIG. 1 conducted within the environment of FIG. 2.

Within the environment identified in FIG. 1, a preferred aspect of one embodiment provides an apparatus for the electronic transfer of funds from a customer to a supplier as illustrated in FIG. 2. A customer browser component 102 is connectedto the Internet 101 and a supplier server component 111 is also connected to the Internet. A service server component 201 is connected to the Internet 101 and a mobile cellular telephone 202 is operable by the customer, that is to say, the same customerwho is using browser 102.

A mobile cellular operator 203 provides mobile cellular services to the mobile cellular telephone 202. The service server component 201 is configured to transmit a plurality of premium rate mobile terminating text messages 204 to the mobilecellular telephone to effect a payment from the customer (at 102) to the supplier (at 111) after the customer has placed an order with the supplier.

The mobile terminating premium rate messages are included in telephone bills received by the mobile telephone owner, resulting in payment 210 being made to the mobile operator 203. Thereafter, the mobile operator 203 effects the appropriatetransfer 211 to the supplier 111. The supplier 111 has now received funds and is therefore prompted to perform delivery 212 of the purchased product or service.

Procedures conducted within the environment of FIG. 2 are detailed in FIG. 3, in the form of a telecommunications protocol diagram. The diagram of FIG. 3 includes the browser 102, the cellular telephone 202, the supplier server 111 and theservice server 201.

Initially, the browser issues a signal 301 to request a page to be supplied from the supplier server 111. In response to receiving this request, a page of data 302 is returned to the browser 102, resulting in a page being displayed to thecustomer at the browser 102.

In response to reviewing the served page, a request 303 for an order is conveyed to the supplier server 111. In response to receiving this order, the product server 111 makes an invitation 304 for a payment to be made. In response to receivingan invitation for a payment to be made, the browser makes an instruction 305 in order to effect the payment. Thus, in accordance with one embodiment, payment is made by issuing premium rate text messages to the mobile telephone.

The supplier server 111 issues an instruction 306 to the service server 201. The service server 201 issues a request 307 to the mobile cellular telephone 202 for a confirmation to the effect that the payment is to be made. Thus, in order toachieve payment by the mobile telephone mechanism, it is necessary to enter a telephone number and it is also necessary for the purchaser to be in possession of the mobile telephone so that the purchaser may effect that confirmation.

The mobile cellular telephone therefore issues a confirmation 308 back to the service server 201 (via the cellular telephone network) to the effect that the purchase has been confirmed.

Upon receiving the request confirmation 308, the service server schedules and issues a plurality of premium rate mobile terminating text messages 309. Thereafter, the product, virtual product or service is sent from the supplier to thepurchaser, as illustrated by arrow 310.

An example of a browser 201 is illustrated in FIG. 4, in which a visual display unit 401 is provided to allow web pages to be displayed. In addition, user input is facilitated by a keyboard 402 and a mouse 403. The applicant has become awarethat browser environments are particularly attractive for displaying catalogues of goods and receiving orders for goods. However, problems arise in terms of effecting payment over the Internet due to security concerns. The mobile telephone systemdescribed herein thereby provides an alternative mechanism for payment.

Generally, the relationship between customers and mobile providers is a strong relationship built on mutual trust. Within the Internet environment it is unlikely for this level of trust to exist. Furthermore, it is not necessary for the userto have access to a credit card or to even possess a credit card.

In the example shown in FIG. 4, the browser takes the form of a desktop computer but equally it could take the form of a laptop computer or similar device. It is also envisaged that the browser and mobile telephone text messaging services couldbe constrained within a unified product, such as a high level mobile device.

FIG. 5 details the visual display unit 401 identified in FIG. 4. The visual display unit 401 in FIG. 5 shows an image relevant for initiating the process of making a payment. Display 501 includes a field 502 in which the current price isdisplayed. The user is then prompted to identify a means of payment, which in this example shows a credit card link 503, a debit card link 504 and the mobile telephone account link 505. In practice, many of these links may be repeated for differentcredit card types, for example, and often each credit card link would include its associated logo or graphical representation, etc.

Having clicked through on link 505 (as shown in FIG. 5) screen 601 is displayed, that also includes a field 602 identifying the required payment. Having clicked through for this type of payment, it is possible that the total payment figure mayhave increased so as to include an additional charge for effecting payment via the mobile cellular telephone network. Thus, assuming a user wishes to continue, the user is invited to enter their cellular telephone number in a field 603 and the user maybe asked to confirm this number in a further field 604. After confirming the payment, a further screen 605 may be displayed, subject to the particular implementation of the application.

Screen 605 includes a field 606 again identifying the total payment. The screen then continues to say that this amount will be deducted from the telephone account and a user is invited to accept the transaction by clicking button 607 ordeclining the transaction by clicking cancel button 608.

Procedures implemented by the service server 201 are identified in FIG. 7. The service server provides for the operating of a payment via the Internet in which details are received, of a transaction, from a product server 111 identifying aprice to be paid by the customer. Details of the customer's mobile telephone are received at the service server and thereafter a plurality of premium rate text messages are transmitted to the mobile telephone to effect that payment.

In response to receiving instructions 306, the service server 201 seeks confirmation from the mobile cellular telephone in operation 701 to the effect that payment is to be made.

Upon receiving confirmation 308, messages are allocated in operation 702, and in operation 703 the premium rate messages are transmitted with confirmation to the supplier being provided in operation 704.

The result of procedure 701 for confirming the payment is illustrated in FIG. 8, in which the mobile cellular telephone 202 receives a message displayed on the mobile telephone display 801. In this example, the message states "please confirmyour payment of" and the amount to be paid is displayed in field 802. In this example, it is possible to confirm the payment by operating the central navigation button 803. Alternatively, the transaction may be cancelled by the operation of a cancelbutton 804.

The confirmation of the payment creates a mobile originating message. This message may incur a modest charge for transmission over the mobile network. In this example, a dedicated mobile telephone is shown. However it should be appreciatedthat the mobile telephone designation also includes other devices with mobile telephony functionality.

FIG. 9 details procedures for the allocation of messages identified in FIG. 7.

Procedure 702 for the allocation of messages is illustrated in FIG. 9. In operation 901 a file 902 of data is read that identifies appropriate local constraints for the transaction. Alternatively, these details may be supplied from anappropriately configured database. The local constraints are relevant for the particular country in which the financial transaction is taking place, including appropriate currency for the transaction and other regulations relating to the use of premiumrate messages.

The constraints contained within file 902 identify the specific examples of premium rate messages that may be deployed, along with a level of payment that is associated with each of these messages. In addition, the constraints also specifymaximum transaction values, usually restricting the total level of transactions that may occur during a day and often also identifying a maximum level of transactions that may take place over a month, given that many customers are billed on a monthlybasis.

In this example, an operator may specify that total transactions for a day must not exceed 30 dollars and total transactions for the month must not exceed 400 dollars. Typically, these constraints are applied across an operator's network andare not allocated on a customer-by-customer basis.

In operation 903 the total value of the transaction is divided into a plurality of messages such that in combination, the value of the messages adds up to the total value of the transaction.

In operation 904 an allocation is made over a number of months. If the total value of the transaction exceeds a monthly limit, it is necessary to spread the transmission of the messages over two or more months.

In operation 905 an allocation is made over a number of days. Again, if either total transactions or monthly transactions exceed the total transactions allowed, the actual transmissions must take place over a number of days, with a plurality ofmessages being allocated for each individual day within the batch.

It is possible for the maximum transmissions to occur within, for example, three days over a particular month. It is possible that the transactions could occur over more days, until the allocation for the month is reached. If the allocationfor the month is reached, it is then necessary to continue making transmissions upon entering the next month.

In operation 906 the transmissions are scheduled, resulting in the generation of a transmission schedule 907.

FIG. 10 shows an example of a constraints file 902 of the type identified in FIG. 9. This defines a total transmission value for the day and a total transmission value for the month. In addition, it identifies valid premium rate message codes. Thus, in this example, at line 1001 a code 861000 effects a charge of 50 cents, as shown at line 1002. Similarly, a code of 861100 effects a charge of 1 dollar and as illustrated at line 1003, a charge of 1.50 dollars is effected as a result oftransmitting code 861110. A code of 861111 results in a charge of 3 dollars and similarly a five dollar charge results from the transmission of code 861112.

An example of a displayed field 802 is also shown in FIG. 10 which, for the purposes of this illustration, indicates a charge of 25.50 dollars.

FIG. 11 shows various use types.

The present preferred apparatus performs a method of transferring funds electronically in which a plurality of premium rate mobile text messages are transmitted from the server to a mobile cellular telephone to effect payment from the customerto the supplier after the customer has placed an order with a supplier via a network connected browser. A database is populated at the server with an identification of each customer's telephone number. It is then possible for customers to makepurchases via this mechanism in a nonregistered mode of operation. However, in accordance with a preferred aspect of one embodiment, the customer is prompted to supply additional personal data. Thus, as illustrated in FIG. 11, nonregistered use of thesystem is illustrated at 1101. After this nonregistered use, a question is asked at 1102 of a customer as to whether they wish to register their use of the system. Thus, when answered in the negative, further nonregistered use may occur at 1101.

If, however, the customer agrees to the registration process (the question asked in operation 1102 being answered in the affirmative), a registration process is performed in operation 1103.

Thereafter, registered use occurs in operation 1104, and thereafter in operation 1105, transaction information may be transferred to suppliers and third parties.

FIG. 12 shows an environment substantially similar to that of FIG. 2, implementing one embodiment. Multiple premium rate mobile terminating text messages 204 are shown being issued from the server 201 to the mobile cellular telephone 202. However, in addition, the user also receives an invitation 215 or a prompt to supply additional personal information.

In an alternative preferred embodiment, after the mobile telephone has provided a positive response to the effect that they are prepared to register, further communication takes place via the browser 201 as illustrated at 215.

FIG. 13 shows an example of an invitation 215 of the type identified in FIG. 12. In the example of an invitation 215 to a browser illustrated in FIG. 13, the browser receives a message 1301 which states "would you like to receive a discount?"In response to receiving this, it is possible for the user to press a cancel button 1302. Alternatively, pressing an "OK" button 1303 results in an affirmative response being returned to the server 201.

FIG. 14 shows a graphical user interface for receiving information. In a preferred embodiment, personal information is received from the user via the user's browser 102.

When the user makes use of browser 102 to effect payment via this method again, the user is presented with a screen of the type shown in FIG. 14. At the browser, the user selects fields within the graphical user interface using mouse 403 andenters the text by keyboard 402. The user then applies a mouse click to the "send" link 1401.

In this example, a first name is received at field 1402 and a family name is received at field 1403. These are text boxes allowing any text entry to be made. Further fields 1404 to 1407 are provided in the form of pull down boxes from whichpredefined selections can be made. Thus, in field 1404 the user is invited to identify their gender and at field 1405 they are invited to identify their city of residence. Similarly, pull down box 1406 invites the user to identify a favoriteentertainment and a similar pull down box at 1407 allows a favorite hobby to be identified within the field. As previously stated, the user then selects link 1401 and the information is transmitted over channel 215 to the database 208 within server 201.

FIG. 15 shows a database table for recording information. Within database 208 a table is created so as to record the information received from each user. At column 1501 a unique identification is given for the user which is then recordedagainst the user's telephone number at column 1502. For nonregistered use, only columns 1501 and 1502 are populated. Alternatively, it would be possible for telephone numbers to be recorded in a separate linked table.

Columns 1503 to 1508 only become populated after a registration process. Thus, a given name and a family name are recorded at columns 1503 and 1504 respectively in response to receiving free text entries 1402 and 1403.

Gender is recorded at 1505 (from entry 1404), with city, entertainment and hobbies being recorded at 1506, 1507 and 1508, in response to entries from 1405, 1406 and 1407.

FIG. 16 shows the generation of a report. It is envisaged that personal data will be collected over a period of time and a plurality of tables may be included within a database of substantially similar configuration to that shown in FIG. 15. Registered users are identified as such, and in a preferred embodiment the user is provided with a discount each time the service is used. As previously described with respect to FIG. 10, the possibility of providing an additional charges for theservice was described, and in a preferred embodiment this charge may be made against nonregistered users whereas registered users may be able to make use of the service for free.

Similarly, suppliers, such as supplier 111, may be in a position to make use of the service effectively for free, but a charge may be required if they wish to obtain user transaction data, essentially for marketing purposes. In a preferredembodiment, it is possible for a supplier to receive transaction data relating to the specific transactions made with them. Alternatively, average data may be of greater assistance such that specific telephone numbers are not required, whereupon it willbe possible to provide a broader range of data, including data obtained from transactions relating to other suppliers.

Furthermore, in an alternative preferred embodiment, given that the personal nature of the data has been removed, it would be possible for this accumulated data to be made available to external parties not actually themselves registered as asupplier. Furthermore, the availability of this data may encourage suppliers to make this service available to their customers.

In a first embodiment it is possible for suppliers to gain access to database 208. Alternatively, it may be possible for the suppliers to receive designated reports, such as report 1601 of the type shown in FIG. 16.

In the example shown in FIG. 16, a supplier is interested in advertising entertainment packages and therefore wishes to know which type of entertainments are preferred by their existing customers. Thus, by referring to the information collectedwithin column 1507, for a number of users, it is possible to perform calculations to determine percentages. Thus, in this example, the supplier receives information to the effect that 40% of their users prefer playing computer games, compared to theother options of watching movies, watching plays, watching sports or watching comedy. Thus, with this information on hand, the supplier may make an educated decision to the effect that further website promotions would best be directed at computer gamesin preference to DVDs and movie downloads, etc.

FIG. 17 details a table in database 208, which includes a table for recording each financial transaction. Nonregistered use as indicated at 1101 and registered use as indicated at 1104 result in the table shown in FIG. 17 being populated.

Table 1701 includes a first column 1702 for recording the identity of the user. Thus, in this example, each user is given a unique number.

The supplier from whom the user is purchasing product/service is identified in column 1703, followed by an indication of the product 1704. Column 1705 records a net price and column 1706 records a discount from the net price. This discountrepresents a discount given for being a registered user and does not relate to any discounts given by the supplier themselves; these being included in the net price figure. Thus, thereafter, column 1707 records an actual price.

In this example, user 4781 has purchased product from supplier Smith, Jones and Big Inc. Thus a total of three products have been purchased, identified in this example as P2, P4 and P5.

FIG. 18 shows an example of procedures for the transfer of information, as indicated in operation 1105.

In operation 1801, information is transferred to a supplier over channel 209, for example. This may result in the supplier receiving customer related information such as that illustrated in FIG. 16.

In operation 1802 information is supplied to third parties. This information is aggregated and does not identify specific customers. The third party does not necessarily make use of the service but it is possible for the third party to obtainthis information for a price.

In operation 1803 details of the user's transactions are transferred to the user's browser. Thus, in a preferred embodiment, it may be possible for registered users to obtain this information without additional charge.

In operation 1804 the transfer of user information to a user's mobile cellular telephone is illustrated. This may be available without charge, or a predetermined number of transmissions per month may be available without charge, after which acharge will be made to the user.

Operation 1803 for the transfer of information to the user's browser results in data being displayed at the user's browser as shown in FIG. 19.

User 4781 logs on to the appropriate website and supplies appropriate information to allow the log on procedure to be completed. Thus, for example, it is likely that a user would identify their telephone and a password. Thus, having enteredthis information, details of recent transactions are supplied to the user.

In the example shown, a statement takes the form of a table. This includes a first column 1901 for identifying the name of the supplier, a second table 1902 for identifying the product, a third table 1903 for identifying the net price and afourth table 1904 for identifying the actual amount paid.

As it can be seen from FIG. 19, the totality of the data available in table 1701 has been filtered so as to show only the transactions for user 781. Furthermore, in this example, the actual discount figure (from column 1706) is not included. However, the system does identify the actual price paid and at 1905 a total is included, possibly for all transactions up to transactions included on the last mobile telephone statement. Thus, a payment is made for mobile telephone services asillustrated at 210, resulting in the transactional data being recorded as paid. Thereafter, in the preferred embodiment, only unpaid transactions are included. In this way, it is possible for a user to be kept up to date as to where they stand inanticipation of the next mobile cellular bill. Furthermore, in an alternative embodiment it is possible for a user to obtain historical records, possibly on a monthly basis.

In response to the transfer of data to the user's mobile telephone, as identified in operation 1804, information is displayed on the mobile cellular telephone 202, as shown in FIG. 20. In this example, the information is shown in a table havinga first column 2001 and a second column 2002. In this example, column 2001 identifies the product (P2, P4, P5 etc) and column 2002 shows the actual price paid AP2, AP4 and AP5 etc. The mobile telephone display may also include a total, shown at 2003,which would be of particular use to users given that it would indicate how much they have spent in a particular month so as to assist them with budgeting.

FIG. 21 shows procedures performed in accordance with a preferred embodiment.

The apparatus described provides for the electronic transfer of funds from a customer to a supplier. In the environment, a plurality of customer browser components are connected to a network and a plurality of supplier browser components areconnected to the network. A server component is connected to the network and the server has a database component. A respective mobile cellular telephone with a telephone number is owned by each of the customers or users. In addition, there is a mobilecellular operator configured to provide mobile cellular services to the mobile cellular telephones. The server component is configured to transmit a plurality of premium rate mobile terminating text messages to the mobile cellular telephone. Inaddition, the server component is configured to populate the database with an identification of each customer's telephone number.

The server component is also configured to receive a classification of the nature of products/services sold by each supplier and is also configured to populate the database component with a table associating suppliers with their respectiveclassifications. The database includes an identification of classifications for each of the telephone numbers and the server allows or prohibits the transmission of the text messages to effect payment dependent upon the identification of storedclassifications for the requesting telephone number.

The overall procedures performed to achieve a sale within the environment of the preferred embodiment are illustrated in FIG. 21.

In operation 2101 items that include products, virtual products and services are made available. However, in order for a product or service to be available for sale using the method described herein, it is necessary for each product or serviceto be provided with a classification, primarily identifying an appropriate age at which the product or service may be received. In many instances, such classifications are readily available, such as for movies and computer games. Furthermore, manyexamples of items sold in this way will not be restricted and as such an appropriate designation is given.

In operation 2102 a record is made of parental blocks. Thus, it is possible for a parent to provide a mobile telephone to, for example, a 14 year old with an appropriate block being recorded such that the 14 year old may receive anythingconsidered appropriate for anyone over 11 or over 13 but not over 15.

In operation 2103 a selection of an item is made and a purchase procedure is initiated, as described with respect to FIGS. 5 and 6.

Thereafter, in operation 2104, the purchase is completed which, in accordance with the preferred embodiment, includes a check to determine whether or not the purchase has been blocked.

An example of a table of classifications is shown in FIG. 22. The first column 2201 of the table includes a list of classification abbreviations and the second column 2202 shows an appropriate description. Thus, in this example, aclassification of 12 indicates that the material is suitable for anyone over 11. A classification of 14 indicates that it is suitable for anyone over 13, a classification of 16 confirms that it is suitable for anyone over 15 and a classification of 18means that it is only appropriate for an adult.

A classification of 0 indicates that the material is not restricted in any way. Furthermore, in this embodiment, a classification of S is included showing that the product relates to a specialist activity. Specialist activity classificationsallow subgroups to be defined in which additional requirements need to be met in order for the purchase to be allowed. For example, such a classification could be included for pharmaceuticals, firearms or even magic tricks.

FIG. 23 shows a graphical user interface for receiving information from a seller.

In order to make items available for sale through the mechanism described herein, it is necessary for a seller to complete a registration procedure for each product, using a browser displaying a graphical user interface of the type shown in FIG.23.

In the interface of FIG. 23, a product designation is provided at field 2301. Similarly, a price is specified at field 2302 and in accordance with this preferred embodiment, a classification is provided at field 2303.

In some embodiments an independent check may be made of the classification. Alternatively contractual conditions with suppliers may state that details of further inventory will not be received from a supplier if misclassifications are included.

Having populated fields 2301 to 2304, the supplier clicks on link 2304, effecting a sending of the entered information to the server database 208.

FIG. 24 illustrates a table within database 208.

At the database 208, each product is given a unique product identification number. Each unique product may be given a product identification number, with the same identification number being used for the same product when sold by differentsellers. Alternatively, the product identification number may be unique for each product sold by each seller.

Within the database 208, tables are constructed identifying the product identification numbers and product descriptions, prices and classifications, etc. However, in addition, indexes are established to facilitate the rapid checking of productidentification numbers against their recorded classification.

A table 2401 is shown in FIG. 24 in which each product identification number is recorded in a column 2402 with its appropriate classification, as supplied by the seller using field 2303, being recorded in column 2405. Thus, as can be seen fromthis example, product 00003 has a classification of 12 with product 0004 having a classification of 18.

Procedures for the recording of parental blocks identified in operation 2102 are detailed in FIG. 25. In response to requesting a parental block, a browser used by a parent, for example, is provided with a graphical user interface of the typeshown in FIG. 25. Using this graphical user interface, a telephone number is entered in field 2501. In field 2502 a classification block is specified. Before a block has been imposed, it is assumed that no restrictions exist. The highest level ofblocking is to enter a classification of 12. With classification of 12, only non-restricted items may be paid for using this service. With classification 12 blocked, this automatically blocks 14, 16 and 18. Similarly, with a block classification of14, only non-restricted and 12 classification products may be purchased. Similarly with a block of 16, only items classified 12 and 14 may be purchased and with a block classification of 18, adult material will be blocked but items classified 12, 14 and16 can be purchased.

In a preferred embodiment, additional measures may be required in order to verify the status of the blocked person imposing the block. Thus, for example, in order to effect a block it may be necessary for the parent to be in actual possessionof the mobile telephone.

Having identified the block classification, the parent is required to specify an unblock code in field 2503 followed by a confirmation of this code in field 2504. This code is kept secret by the parent and will be required if the parent wishesto adjust the level of blocking or remove the blocking altogether. Thus, it is not possible for a child using the mobile telephone to remove the block unless they are aware of the unblock code. Furthermore, should the unblock code become known to theuser, it would be relatively straightforward for the parent to repeat the blocking procedure using an alternative code.

Having completed the fields in the user interface, the parent clicks on link 2505, resulting in the information being supplied to the database 208.

FIG. 26 shows another table within the database. In response to receiving parental block information, a table 2601, as shown in FIG. 26, is populated at the database 208.

Blocking information is received continually and in no particular order. However, in order to facilitate the fast searching of this information, a primary key is established at the database 208. Thus, a first column 2602 records the blockedclassifications in order, followed by an identification of the user ID in column 2603.

A method performed within the environment and in accordance with the preferred embodiment is detailed in FIG. 27. Thus, this method allows for funds transfer electronically by populating a database at the server component with an indication ofa customer's telephone number. On receiving a classification of the nature of the products/services sold by each of a plurality of suppliers. The database component is populated with a table associating suppliers with their respective classificationsand an indication of classifications is provided for each telephone number. The transmission of premium rate mobile terminating text messages to effect a payment is allowed upon the identification of stored classifications.

In use, an item has been selected and the purchasing procedure has been initiated by clicking link 505 identified in FIG. 5. Thereafter, as shown in FIG. 6, it is necessary to identify the user's telephone number first in field 603 and then infield 604. If accepted, the user will receive a display as illustrated at 605.

Referring to the procedures identified in FIG. 27, having received data from interface 601, an identification of the product is made in operation 2701. This information will have been collected by the system during the product selection processand therefore the product ID should be included within data contained within the web page.

In operation 2702 the product classification is read with reference to table 2401. Thus, if product 0002 has been selected, the system is now aware that this has a classification of 0. Similarly, if product 00004 has been selected, the systemis aware that the product has a classification of 18.

In operation 2703 the user ID is identified, and in operation 2704 a question is asked as to whether the user has been blocked. The classification for product 00004 is recorded as 18, so if this product is selected, blocked classes 18 areconsidered in table 2601. In this example, this will show that user 0002, 0006, 021, 031 and 164 should be blocked. In addition, any user with classifications 12, 14 or 16 would also be blocked.

If the sale has not been blocked, the sale will continue in operation 2705. However, if, for example, user 0006 attempts to purchase product 0004, the question asked in operation 2704 will be answered in the affirmative and the sale will beblocked.

FIG. 28 illustrates a message displayed to a user when a transaction is blocked.

When the question asked in operation 2704 is answered in the negative, the sale continues, as illustrated in operation 2705, and the user is presented with an interface 605 allowing them to accept or cancel the sale via their mobile telephoneaccount. However, if the question asked in operation 2704 is answered in the affirmative, to the effect that the sale has been blocked, a message 2801 will be displayed on monitor 401 to the effect that the sale has been blocked. Thus, a message states"sorry! This purchase has been blocked."

In the foregoing specification, the disclosure has been described with reference to specific exemplary embodiments thereof. It will be evident that various modifications may be made thereto without departing from the broader spirit and scope asset forth in the following claims. The specification and drawings are, accordingly, to be regarded in an illustrative sense rather than a restrictive sense.